Our phones have been ringing off the hook the past few weeks (which is a good thing!) and we anticipate that this will continue as customers, prospects and partners work to get their arms around the new U.S. Department of Health and Human Services (HHS) Health Insurance Portability and Accountability Act (HIPAA) Omnibus Rule that [...]

We are excited to announce our new partnerships with HealthGuard, a health security and risk management services company. We are providing them with a full suite of Managed Security Services for their customers and partners, including HIPAA Essential, PCI Complete, managed firewall, intrusion detection and prevention, log management, and web application firewall (WAF). Additionally, HealthGuard [...]

Among companies handling patient records, the Health Information Technology for Economic and Clinical Health (HITECH) Act is old news. Going into effect in February 2009, this legislation sought to advance health information technology use standards to eventually make certain functions and safeguards mandatory, increasing the requirements for compliance with the Health Insurance Portability and Accountability [...]

We all have tasks we should work on but for some reason, they never seem to reach the top of the pile. In our personal lives, this can be anything from cleaning the oven to picking up the dry cleaning. In our work lives, these projects usually include things like expense reports, low priority emails, [...]

Let’s take a look at the last 7 days of suspicious activity in which we find the Xilcter/Zeus Trojan running wild with an average of 864 unique events per customer. This is an average of over 120 per day. It’s becoming more and more evident that propagation of this Trojan has grown significantly. It seems [...]

With the creation of brute force attacks, two-factor authentications have long since become the new standard for Network Security. Two-Factor authentications, as the name implies, uses two independent factors in conjunction to authenticate a person, generally resulting in a higher level of authentication assurance. By taking something you know such as a password and combining [...]